System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality (Q2082773): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Variational Bayesian approach for ARX systems with missing observations and varying time-delays / rank
 
Normal rank
Property / cites work
 
Property / cites work: Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Event-triggered identification of FIR systems with binary-valued output observations / rank
 
Normal rank
Property / cites work
 
Property / cites work: System identification with quantized observations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotically efficient identification of FIR systems with quantized observations and general quantized inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Measure Theory and Probability Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4359973 / rank
 
Normal rank
Property / cites work
 
Property / cites work: System Identification With Binary-Valued Observations Under Data Tampering Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: A concrete approach to classical analysis / rank
 
Normal rank

Latest revision as of 07:58, 30 July 2024

scientific article
Language Label Description Also known as
English
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
scientific article

    Statements

    System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    4 October 2022
    0 references
    system identification
    0 references
    denial of service attack
    0 references
    data tampering attack
    0 references
    defense scheme
    0 references

    Identifiers